Security Designs for the Cloud, IoT, and Social Networking
by Dac-Nhuong Le, Chintan Bhatt, Mani Madhukar
List of Tables
1.1 Commonly used symmetric encryption algorithms and their key length.
1.3 Comparison of encryption algorithms.
1.4 Comparison performance of encryption algorithms.
4.1 Summary of potential security issues found in fog applications.
4.2 Cloud computing vs. fog computing.
8.1 Summary of the management, infrastructure and accessibility of deployment models.
9.1 Power ratings of the appliances.
9.2 Calculation of power consumption (without IoT).
9.3 Calculation of power consumption (with IoT).
9.4 Calculation of power consumption (with and without IoT).
9.5 Cost calculation (with and without IoT).
13.1 Intraocular pressure ranges with DP with a point of cost e =~ 0:121 onwards.
14.1 Inter-module edges of the EEG game application.
15.1 Summary of taxonomy of CPSS-dependent intelligent transportation systems.